Blog

RESULTS Technology partners with Imaging Concepts to expand professional services

LENEXA, KAN., FEBRUARY 8, 2019 – RESULTS Technology, the award-winning technology services firm specializing in the IT compliance industry and headquartered in Kansas City, announced today that they will be partnering with Imaging Concepts, a family owned and operated provider of copiers, scanners and multi-functional printers (MFP) in the Kansas City metro area.

Get rid of Windows 10 bloatware

cyber security

Who doesn’t love getting value-for-money deals? Normally, getting more for less is an amazing deal — unless what you get is “bloatware.” It is software that device manufacturers pre-install in your Windows 10 PC or laptop at the behest of deep-pocketed software companies. Beyond taking up storage space and using up processing power, this type […]

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]

Quick facts about virtualization and the cloud

Cloud Computing

Virtualization and cloud computing are sometimes mistaken as one and the same, causing much confusion. For the record, virtualization is different from cloud computing, but these two technologies usually overlap. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike in email traffic, […]

What is Single Sign-On and who is it for?

An average enterprise uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge problem for both users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how it works. What is SSO? Single Sign-On […]

Boost mobile security with virtualization

Mobile device security is paramount in today’s IT landscape. There are plenty of ways to be sure your employees are accessing data safely away from the office, but there is one solution we recommend considering: combining mobile security efforts with virtualization technology. Mobile device management and virtualization Mobile device management (MDM) is about controlling how […]

Benefits of using a VPN

VPN Cyber Security

VPNs are now a vital component of cybersecurity. While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one […]

PHI security best practices

PCI Compliance and Security

Healthcare companies and the vast amount of valuable patient information they hold have become a major target of cyberattacks. Hospitals must combat this with a highly trained team of technicians equipped with the following technologies and security tools. Strict access policies To control access to protected health information (PHI), your IT department must introduce access […]

Which is better, Hangouts or Skype?

VOIP

Many online collaboration tools are coming up with improved features for online communication. These include Microsoft’s Skype for Business and Google’s Hangouts Meet. Both are used for video calling, group chat, private chat, and file and image sharing. Despite these similarities, you may prefer one over the other. Calling features Hangouts and Skype both offer […]

Simple steps to speed up Google Chrome

Google Chrome is the most preferred web browsers across the world. Unlike its competitors that take forever to load because of their media-heavy landing pages, Chrome is a minimalist browser that runs at top speed. But, like any expandable browser that allows features and extensions to be installed, Chrome can slow down because of the […]